From 65ffd999cbb4f2b5640e1024313306efab5cb02f Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 5 Feb 2025 03:04:05 +0000 Subject: [PATCH] Auto-Update: 2025-02-05T03:00:38.333123+00:00 --- CVE-2018/CVE-2018-194xx/CVE-2018-19410.json | 6 +- CVE-2018/CVE-2018-92xx/CVE-2018-9276.json | 6 +- CVE-2024/CVE-2024-133xx/CVE-2024-13335.json | 32 +++++++-- CVE-2024/CVE-2024-133xx/CVE-2024-13354.json | 54 +++++++++++++-- CVE-2024/CVE-2024-134xx/CVE-2024-13408.json | 66 ++++++++++++++++-- CVE-2024/CVE-2024-134xx/CVE-2024-13409.json | 76 ++++++++++++++++++--- CVE-2024/CVE-2024-135xx/CVE-2024-13542.json | 54 +++++++++++++-- CVE-2024/CVE-2024-135xx/CVE-2024-13572.json | 54 +++++++++++++-- CVE-2024/CVE-2024-135xx/CVE-2024-13583.json | 59 ++++++++++++++-- CVE-2024/CVE-2024-137xx/CVE-2024-13722.json | 10 ++- CVE-2024/CVE-2024-137xx/CVE-2024-13723.json | 10 ++- CVE-2024/CVE-2024-290xx/CVE-2024-29059.json | 8 ++- CVE-2024/CVE-2024-451xx/CVE-2024-45195.json | 6 +- CVE-2025/CVE-2025-230xx/CVE-2025-23087.json | 13 +++- CVE-2025/CVE-2025-230xx/CVE-2025-23088.json | 13 +++- CVE-2025/CVE-2025-230xx/CVE-2025-23089.json | 13 +++- CVE-2025/CVE-2025-231xx/CVE-2025-23114.json | 44 ++++++++++++ README.md | 41 ++++++----- _state.csv | 57 ++++++++-------- 19 files changed, 521 insertions(+), 101 deletions(-) create mode 100644 CVE-2025/CVE-2025-231xx/CVE-2025-23114.json diff --git a/CVE-2018/CVE-2018-194xx/CVE-2018-19410.json b/CVE-2018/CVE-2018-194xx/CVE-2018-19410.json index 0c8df50a1a2..9ea9dd12aa9 100644 --- a/CVE-2018/CVE-2018-194xx/CVE-2018-19410.json +++ b/CVE-2018/CVE-2018-194xx/CVE-2018-19410.json @@ -2,7 +2,7 @@ "id": "CVE-2018-19410", "sourceIdentifier": "cve@mitre.org", "published": "2018-11-21T16:29:00.347", - "lastModified": "2025-02-04T16:15:30.963", + "lastModified": "2025-02-05T02:00:01.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -86,6 +86,10 @@ } ] }, + "cisaExploitAdd": "2025-02-04", + "cisaActionDue": "2025-02-25", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Paessler PRTG Network Monitor Local File Inclusion Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", diff --git a/CVE-2018/CVE-2018-92xx/CVE-2018-9276.json b/CVE-2018/CVE-2018-92xx/CVE-2018-9276.json index 0ba9b7412f7..13b10d2dd39 100644 --- a/CVE-2018/CVE-2018-92xx/CVE-2018-9276.json +++ b/CVE-2018/CVE-2018-92xx/CVE-2018-9276.json @@ -2,7 +2,7 @@ "id": "CVE-2018-9276", "sourceIdentifier": "cve@mitre.org", "published": "2018-07-02T16:29:00.600", - "lastModified": "2025-02-04T16:15:31.603", + "lastModified": "2025-02-05T02:00:01.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -84,6 +84,10 @@ } ] }, + "cisaExploitAdd": "2025-02-04", + "cisaActionDue": "2025-02-25", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Paessler PRTG Network Monitor OS Command Injection Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13335.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13335.json index cd0ac2160d9..a1e13ac4fd3 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13335.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13335.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13335", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-24T11:15:07.973", - "lastModified": "2025-01-24T11:15:07.973", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T01:37:46.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:templatescoder:spexo_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.15", + "matchCriteriaId": "4F105988-7B06-446F-91B4-0678246B8067" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3227353/sastra-essential-addons-for-elementor/trunk/inc/wizard/wizard-ajax-api.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4edc7ef9-33db-4433-8ef2-cd06089ee8d5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13354.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13354.json index 15b31458e4d..261468ca54e 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13354.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13354.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13354", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-24T11:15:08.887", - "lastModified": "2025-01-24T11:15:08.887", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T01:36:55.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyberchimps:responsive_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.5", + "matchCriteriaId": "94445C04-EB66-4616-850A-ED63DDB4A2F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3226779%40responsive-addons-for-elementor&new=3226779%40responsive-addons-for-elementor&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c46d71fb-ccf1-4cbe-8088-edb7fba225e9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13408.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13408.json index 28dc8e4513b..01b3544e64b 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13408.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13408.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13408", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-24T11:15:09.043", - "lastModified": "2025-01-24T11:15:09.043", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T01:37:13.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -36,29 +36,83 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-98" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pickplugins:post_grid:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.7", + "matchCriteriaId": "E6088334-1942-4C11-89B2-963D748B5EEA" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3227281/post-grid-carousel-ultimate/tags/1.7/includes/classes/shortcode.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff346465-62c2-4a2b-8a4a-c88558d7cabd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13409.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13409.json index 5dcf5e70750..878da119ef8 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13409.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13409.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13409", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-24T11:15:09.213", - "lastModified": "2025-01-24T11:15:09.213", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T01:36:36.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -36,37 +36,97 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpwax:post_grid\\,_slider_\\&_carousel_ultimate:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.7", + "matchCriteriaId": "AC5313B7-8A99-4B78-945C-3D410468DB47" + } + ] + } + ] } ], "references": [ { "url": "https://ja.wordpress.org/plugins/post-grid-carousel-ultimate/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/post-grid-carousel-ultimate/tags/1.6.10/includes/classes/ajax.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3227281/post-grid-carousel-ultimate/tags/1.7/includes/classes/ajax.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/38672a45-b7a7-445f-9e77-7050df6920fa?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13542.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13542.json index ae37ba4c11f..96e53b8cec8 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13542.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13542.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13542", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-24T11:15:09.377", - "lastModified": "2025-01-24T11:15:09.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T01:35:33.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:agenceseo:wp_google_street_view:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.4", + "matchCriteriaId": "07E98D68-890A-457F-8224-728263872E1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3227140%40wp-google-street-view&new=3227140%40wp-google-street-view&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b1944a9-4bc4-4ac2-83c3-55d6d61f405c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13572.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13572.json index ba5b2b5282b..6bb2fc73094 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13572.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13572.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13572", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-24T11:15:09.520", - "lastModified": "2025-01-24T11:15:09.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T01:25:51.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nfusionsolutions:precious_metals_charts_and_widgets:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.9", + "matchCriteriaId": "EBF191BC-66D2-44ED-9586-ECFC241846FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3227123%40precious-metals-chart-and-widgets&new=3227123%40precious-metals-chart-and-widgets&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f2c8c5f-2017-4b22-a864-dc142b3b1afb?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13583.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13583.json index 8aa687c07b7..4c58701c6ad 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13583.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13583.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13583", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-24T10:15:07.770", - "lastModified": "2025-01-24T10:15:07.770", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T01:38:33.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:come2theweb:simple_gallery_with_filter:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "820ED387-41D1-450A-9C0D-56612DD8C364" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/simple-gallery-with-filter/trunk/simple-gallery-with-filter.php#L377", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3227234%40simple-gallery-with-filter&new=3227234%40simple-gallery-with-filter&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c088264-64a2-4a36-ae3b-fdf60f3837e2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13722.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13722.json index a46d3691b7d..8b7a5615016 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13722.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13722.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13722", "sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "published": "2025-02-04T22:15:40.113", - "lastModified": "2025-02-04T22:15:40.113", + "lastModified": "2025-02-05T01:15:08.323", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -36,6 +36,14 @@ { "url": "https://www.nagvis.org/downloads/changelog/1.9.42", "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9" + }, + { + "url": "http://seclists.org/fulldisclosure/2025/Feb/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/02/04/3", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13723.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13723.json index 141ddbb2f96..e10d6465b07 100644 --- a/CVE-2024/CVE-2024-137xx/CVE-2024-13723.json +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13723.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13723", "sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "published": "2025-02-04T22:15:40.227", - "lastModified": "2025-02-04T22:15:40.227", + "lastModified": "2025-02-05T01:15:08.440", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -36,6 +36,14 @@ { "url": "https://www.nagvis.org/downloads/changelog/1.9.42", "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9" + }, + { + "url": "http://seclists.org/fulldisclosure/2025/Feb/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/02/04/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29059.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29059.json index e483d202692..8a4a3a3f1bf 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29059.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29059.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29059", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-23T00:15:09.150", - "lastModified": "2025-01-08T18:33:02.303", + "lastModified": "2025-02-05T02:00:01.767", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -39,6 +39,10 @@ } ] }, + "cisaExploitAdd": "2025-02-04", + "cisaActionDue": "2025-02-25", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Microsoft .NET Framework Information Disclosure Vulnerability", "weaknesses": [ { "source": "secure@microsoft.com", diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json index a9043bef34f..29ed005776e 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45195", "sourceIdentifier": "security@apache.org", "published": "2024-09-04T09:15:04.397", - "lastModified": "2024-11-21T09:37:28.073", + "lastModified": "2025-02-05T02:00:01.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ } ] }, + "cisaExploitAdd": "2025-02-04", + "cisaActionDue": "2025-02-25", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Apache OFBiz Forced Browsing Vulnerability", "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23087.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23087.json index 3fc0f8bd10c..ce269d0567e 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23087.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23087.json @@ -2,13 +2,20 @@ "id": "CVE-2025-23087", "sourceIdentifier": "support@hackerone.com", "published": "2025-01-22T02:15:34.080", - "lastModified": "2025-01-23T22:15:16.260", + "lastModified": "2025-02-05T02:15:28.267", "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "cveTags": [ + { + "sourceIdentifier": "support@hackerone.com", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support." + "value": "This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\nNOTE: use of the CVE List to report that a product is unsupported, without reference to a specific defect, is novel and the CVE Program is actively assessing both the validity and potential value of this approach.\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23088.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23088.json index cbd3b461bd6..e69fe843ab2 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23088.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23088.json @@ -2,13 +2,20 @@ "id": "CVE-2025-23088", "sourceIdentifier": "support@hackerone.com", "published": "2025-01-22T02:15:34.207", - "lastModified": "2025-01-23T22:15:16.370", + "lastModified": "2025-02-05T02:15:28.413", "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "cveTags": [ + { + "sourceIdentifier": "support@hackerone.com", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support." + "value": "NOTE: use of the CVE List to report that a product is unsupported, without reference to a specific defect, is novel and the CVE Program is actively assessing both the validity and potential value of this approach.\r\n\r\nThis CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23089.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23089.json index 655e12e1593..fc93f8813e2 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23089.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23089.json @@ -2,13 +2,20 @@ "id": "CVE-2025-23089", "sourceIdentifier": "support@hackerone.com", "published": "2025-01-22T02:15:34.327", - "lastModified": "2025-01-23T22:15:16.460", + "lastModified": "2025-02-05T02:15:28.517", "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "cveTags": [ + { + "sourceIdentifier": "support@hackerone.com", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support." + "value": "NOTE: use of the CVE List to report that a product is unsupported, without reference to a specific defect, is novel and the CVE Program is actively assessing both the validity and potential value of this approach.\r\n\r\nThis CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components).\r\n\r\nUsers are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23114.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23114.json new file mode 100644 index 00000000000..cd7977fe4ba --- /dev/null +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23114.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-23114", + "sourceIdentifier": "support@hackerone.com", + "published": "2025-02-05T02:15:28.610", + "lastModified": "2025-02-05T02:15:28.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Veeam Updater component allows Man-in-the-Middle attackers to execute arbitrary code on the affected server. This issue occurs due to a failure to properly validate TLS certificate." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://www.veeam.com/kb4712", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6ed85658b66..64dbdf73210 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-05T00:55:19.822768+00:00 +2025-02-05T03:00:38.333123+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-05T00:15:28.173000+00:00 +2025-02-05T02:15:28.610000+00:00 ``` ### Last Data Feed Release @@ -27,37 +27,42 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-02-04T01:00:10.100475+00:00 +2025-02-05T01:00:04.367301+00:00 ``` ### Total Number of included CVEs ```plain -280097 +280098 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `1` -- [CVE-2023-39943](CVE-2023/CVE-2023-399xx/CVE-2023-39943.json) (`2025-02-04T23:15:08.237`) -- [CVE-2023-40222](CVE-2023/CVE-2023-402xx/CVE-2023-40222.json) (`2025-02-04T23:15:08.413`) -- [CVE-2024-11467](CVE-2024/CVE-2024-114xx/CVE-2024-11467.json) (`2025-02-04T23:15:08.580`) -- [CVE-2024-11468](CVE-2024/CVE-2024-114xx/CVE-2024-11468.json) (`2025-02-04T23:15:08.717`) -- [CVE-2024-48445](CVE-2024/CVE-2024-484xx/CVE-2024-48445.json) (`2025-02-04T23:15:08.850`) -- [CVE-2024-53962](CVE-2024/CVE-2024-539xx/CVE-2024-53962.json) (`2025-02-05T00:15:27.410`) -- [CVE-2024-53963](CVE-2024/CVE-2024-539xx/CVE-2024-53963.json) (`2025-02-05T00:15:27.580`) -- [CVE-2024-53964](CVE-2024/CVE-2024-539xx/CVE-2024-53964.json) (`2025-02-05T00:15:27.723`) -- [CVE-2024-53965](CVE-2024/CVE-2024-539xx/CVE-2024-53965.json) (`2025-02-05T00:15:27.870`) -- [CVE-2024-53966](CVE-2024/CVE-2024-539xx/CVE-2024-53966.json) (`2025-02-05T00:15:28.023`) -- [CVE-2025-0413](CVE-2025/CVE-2025-04xx/CVE-2025-0413.json) (`2025-02-05T00:15:28.173`) +- [CVE-2025-23114](CVE-2025/CVE-2025-231xx/CVE-2025-23114.json) (`2025-02-05T02:15:28.610`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `16` -- [CVE-2014-0546](CVE-2014/CVE-2014-05xx/CVE-2014-0546.json) (`2025-02-04T23:15:07.950`) +- [CVE-2018-19410](CVE-2018/CVE-2018-194xx/CVE-2018-19410.json) (`2025-02-05T02:00:01.767`) +- [CVE-2018-9276](CVE-2018/CVE-2018-92xx/CVE-2018-9276.json) (`2025-02-05T02:00:01.767`) +- [CVE-2024-13335](CVE-2024/CVE-2024-133xx/CVE-2024-13335.json) (`2025-02-05T01:37:46.517`) +- [CVE-2024-13354](CVE-2024/CVE-2024-133xx/CVE-2024-13354.json) (`2025-02-05T01:36:55.960`) +- [CVE-2024-13408](CVE-2024/CVE-2024-134xx/CVE-2024-13408.json) (`2025-02-05T01:37:13.827`) +- [CVE-2024-13409](CVE-2024/CVE-2024-134xx/CVE-2024-13409.json) (`2025-02-05T01:36:36.047`) +- [CVE-2024-13542](CVE-2024/CVE-2024-135xx/CVE-2024-13542.json) (`2025-02-05T01:35:33.207`) +- [CVE-2024-13572](CVE-2024/CVE-2024-135xx/CVE-2024-13572.json) (`2025-02-05T01:25:51.813`) +- [CVE-2024-13583](CVE-2024/CVE-2024-135xx/CVE-2024-13583.json) (`2025-02-05T01:38:33.527`) +- [CVE-2024-13722](CVE-2024/CVE-2024-137xx/CVE-2024-13722.json) (`2025-02-05T01:15:08.323`) +- [CVE-2024-13723](CVE-2024/CVE-2024-137xx/CVE-2024-13723.json) (`2025-02-05T01:15:08.440`) +- [CVE-2024-29059](CVE-2024/CVE-2024-290xx/CVE-2024-29059.json) (`2025-02-05T02:00:01.767`) +- [CVE-2024-45195](CVE-2024/CVE-2024-451xx/CVE-2024-45195.json) (`2025-02-05T02:00:01.767`) +- [CVE-2025-23087](CVE-2025/CVE-2025-230xx/CVE-2025-23087.json) (`2025-02-05T02:15:28.267`) +- [CVE-2025-23088](CVE-2025/CVE-2025-230xx/CVE-2025-23088.json) (`2025-02-05T02:15:28.413`) +- [CVE-2025-23089](CVE-2025/CVE-2025-230xx/CVE-2025-23089.json) (`2025-02-05T02:15:28.517`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5aeaabbec71..d0da0eb9180 100644 --- a/_state.csv +++ b/_state.csv @@ -65026,7 +65026,7 @@ CVE-2014-0542,0,0,fbbae5aa5bd2b99837b91bc5a55d0d23bc0909ce012aa658a0a70de3681197 CVE-2014-0543,0,0,b274c780f0466077acaf027916a755319f6e77f2db6123359b58b5b34ee1a354,2024-11-21T02:02:21.360000 CVE-2014-0544,0,0,0fa0ea93aa9a3f0a22963adfb2e80712f5ab07190ea3e8b339366579d2c88455,2024-11-21T02:02:21.500000 CVE-2014-0545,0,0,528d5e5b2f44f2a0536e86fe2e8c2c1c24a8ab5b69df4e81e30d9f0fa2293a72,2024-11-21T02:02:21.623000 -CVE-2014-0546,0,1,5ba5cfcc1a82a7200d1de1b761989cd76312a5d0d561fd2749f70459e5df9db2,2025-02-04T23:15:07.950000 +CVE-2014-0546,0,0,5ba5cfcc1a82a7200d1de1b761989cd76312a5d0d561fd2749f70459e5df9db2,2025-02-04T23:15:07.950000 CVE-2014-0547,0,0,b30a2293b7d47a6ccba0e0df5c871196625c5e65ff5adfc657babd1c1b1be8ed,2024-11-21T02:02:21.870000 CVE-2014-0548,0,0,fb4c5f4dc7a5879154d5c4c94ade40155233e90da3caaeda714406abdcecdd40,2024-11-21T02:02:22.010000 CVE-2014-0549,0,0,0d1e6ae4e25c16d5596402e35fb70d20b3121eb60ba76da993d65abdfa62050a,2024-11-21T02:02:22.150000 @@ -119242,7 +119242,7 @@ CVE-2018-19406,0,0,43a6b9abcb935b102d54df72d8bec105050eff0847d09bee05a843fd0844c CVE-2018-19407,0,0,24fea91ce6b2e274d978c9dab0a2381b2df1539d9b3c9be92ca0e5747b6e9a79,2024-11-21T03:57:51.883000 CVE-2018-19409,0,0,1876e55a2d65afba0be02ce8a4b2444f17432a36bc272a7f6b07999057ecb22f,2024-11-21T03:57:52.067000 CVE-2018-1941,0,0,7221aec0ebd68fd329a49613886292da9a4f97973fdf56aa45caaa0dfabf726c,2024-11-21T04:00:38.130000 -CVE-2018-19410,0,0,9ea6f866e5c7e8905aa7260db22ca43a297aefa8acf8dd23373d75a72b6c93ba,2025-02-04T16:15:30.963000 +CVE-2018-19410,0,1,3c3e182d325d17685928baf094ba73945add27a392163f3ff03155eb6d1891c8,2025-02-05T02:00:01.767000 CVE-2018-19411,0,0,af45ed89010d349c21ea79a761116ae9a975994d2004d0d769bee072e0e3e153,2024-11-21T03:57:52.390000 CVE-2018-19413,0,0,f4113187e10bf90fb789c0d6906ec800aca2db8949bd6c22eb87b2974b518c1a,2024-11-21T03:57:52.540000 CVE-2018-19414,0,0,8ef7b90d3ca4f10c7d7d78e3d33ab0b1878ed67276ca2eb97b5dc76432c2fb6c,2024-11-21T03:57:52.690000 @@ -126869,7 +126869,7 @@ CVE-2018-9272,0,0,ac554883181ea7a8e6a7dc5aae78490d576013aafb81a6f499cfcb5caabdc3 CVE-2018-9273,0,0,87b88345c90ffaef935bcb7a09ce9476b02fca862f53f32581cc84e26fac9166,2024-11-21T04:15:16.210000 CVE-2018-9274,0,0,2eb92080af4fbf961f1e5f751288f455e1c66b2f5e2512eefdfab3ef55f08244,2024-11-21T04:15:16.370000 CVE-2018-9275,0,0,a8d6e5bdcca45958f73a4232e8f17755e94443388e2a9fc9a136fe387e6300a1,2024-11-21T04:15:16.520000 -CVE-2018-9276,0,0,0c0c9a2d80fdde1b8717f7d134d8b49d9dec54d47b9886b1f54bd6f26073a6fc,2025-02-04T16:15:31.603000 +CVE-2018-9276,0,1,ce6bbfab058f2da75089192a60f4b78830dad189451aa000a753c5d2e3b5ccc2,2025-02-05T02:00:01.767000 CVE-2018-9279,0,0,0a86219880870026a4d53c5397bc07946d9c71712fd7e40dcc9f1723b2e42de2,2024-11-21T04:15:16.833000 CVE-2018-9280,0,0,a32154fcbceddb33a222c921a469a97842c8df1742b170e1248af4f6c92328b2,2024-11-21T04:15:16.980000 CVE-2018-9281,0,0,db4c44c2f0239c12c4e1201d93237d902949521e082bcf8f5a76fde8a4caf846,2024-11-21T04:15:17.127000 @@ -231011,7 +231011,7 @@ CVE-2023-39938,0,0,7e109afc9eac03484142ad7ce4a33710b94b2e3183fb9389d992c4ec0028b CVE-2023-39939,0,0,9ef48a7bfc7f05d96edc1ca825e661088d75871ac2f741da3911c5c17344852f,2024-11-21T08:16:04.723000 CVE-2023-3994,0,0,5eadb5656ef683f50a27dc29b7fb2429811878a8a7202505763e365a3355dbec,2024-11-21T08:18:29.510000 CVE-2023-39941,0,0,e3ac3f7d1daba525a3ab09017ce65465e29792eb0e3d7b5b68368f5a862f5249,2024-11-21T08:16:04.863000 -CVE-2023-39943,1,1,e661ca2e105c5e25998c2f8d858df936e430a2441217c4759ab9bda81aa87045,2025-02-04T23:15:08.237000 +CVE-2023-39943,0,0,e661ca2e105c5e25998c2f8d858df936e430a2441217c4759ab9bda81aa87045,2025-02-04T23:15:08.237000 CVE-2023-39944,0,0,9f6156ae2b84f5ad79f0a55f25f28359e708025cd5e96110436a0c3be335d2a0,2024-11-21T08:16:05.017000 CVE-2023-39945,0,0,ce324f7e0ce427a27c5aab4f1517864e619374db1b79381165b92ad9fb7980d6,2024-11-21T08:16:05.163000 CVE-2023-39946,0,0,11f47a58d2fac4f19d0f78f83831675635eabe780007119732a2ec66fa0b2bff,2024-11-21T08:16:05.313000 @@ -231295,7 +231295,7 @@ CVE-2023-40219,0,0,d312cff569dae579b11a2237538409084b8189381ad409b7b26a9e9c9cf4f CVE-2023-4022,0,0,7d28cfa5cb69299ac816454a0ce6e4287487b976b7e847836ca22e4bb44c1918,2024-11-21T08:34:14.873000 CVE-2023-40220,0,0,4e4c8d42b37fdc492577d4df159739563bf50d025eb5eae2e90cdd97ddf5718f,2024-11-21T08:19:01.780000 CVE-2023-40221,0,0,0f5c4c77c15a1563f65ecaa72879d46af8c8213e98a1889ade52c63df5bdb7d3,2024-11-21T08:19:01.930000 -CVE-2023-40222,1,1,af47ed954dfb107b325ee1c0f57d52f7328de88f20f4da77b456047ef86157d7,2025-02-04T23:15:08.413000 +CVE-2023-40222,0,0,af47ed954dfb107b325ee1c0f57d52f7328de88f20f4da77b456047ef86157d7,2025-02-04T23:15:08.413000 CVE-2023-40223,0,0,9aaaac728328ced048b6d6b5cb0c8d5341ea770b71a983787e5f397c0b28849c,2024-11-21T08:19:02.073000 CVE-2023-40224,0,0,9cd3bec58e8169eaf67cb8ce0484da56183a2fef50788503a91b137a9042fc9f,2024-11-21T08:19:02.240000 CVE-2023-40225,0,0,821a9a37066f54cbe57bb3d978f89daa73ce11405043e140b875f5eb678ef55b,2024-11-21T08:19:02.407000 @@ -244657,8 +244657,8 @@ CVE-2024-11463,0,0,ad17f3fab6bfb40a789d68c4383c6c0e1f14efa77f86cc521d310c195559f CVE-2024-11464,0,0,5828db9c008addcaa10da0b57e51f0230f10838dab3e51e60f8d2fcb9d133719,2024-12-07T12:15:19.567000 CVE-2024-11465,0,0,0028662c24c58537e31fc6c5ac2f25bde09edc01df058369957c93345fce2c39,2025-01-07T05:15:13.287000 CVE-2024-11466,0,0,36ba29a0e83960f183cdc1bb8910604befb538a9ed8bdd074a88ef8b7f706e46,2024-12-04T08:15:06.523000 -CVE-2024-11467,1,1,c9ea79d54665ec7d1ef0e18e111f36fba68f9d474624eb445b41de6faf036d99,2025-02-04T23:15:08.580000 -CVE-2024-11468,1,1,0f61495e13150fc5d894544aa63baf379c278b18eb392545f932046f2648e26e,2025-02-04T23:15:08.717000 +CVE-2024-11467,0,0,c9ea79d54665ec7d1ef0e18e111f36fba68f9d474624eb445b41de6faf036d99,2025-02-04T23:15:08.580000 +CVE-2024-11468,0,0,0f61495e13150fc5d894544aa63baf379c278b18eb392545f932046f2648e26e,2025-02-04T23:15:08.717000 CVE-2024-1147,0,0,7c585dad4e071b38d649d847ff37c79a25a5d07f7a32720dda50f90a08541bc4,2024-11-21T08:49:54.360000 CVE-2024-11477,0,0,3e8ae99590c1aecc53c52bff36b8f44bed9b32563a126fb58a5303ed844daede,2024-12-11T19:23:36.800000 CVE-2024-11479,0,0,e45a25bfdd55a73dd4f84ed406864a56b4c33194e1807e98971c4aae47176800,2024-12-04T01:15:04.650000 @@ -246270,7 +246270,7 @@ CVE-2024-13331,0,0,67f23a0941a92763c02801e346ee19705f3ba74d128320b19fba8a2229105 CVE-2024-13332,0,0,4ad8a5df5830f0dd48ac9bc5ca6772cb81eb2d689d83a2ad63ea4e51ca0615c4,2025-02-04T19:15:31.070000 CVE-2024-13333,0,0,413ea7e4b64b8aef5dd8714980de1abedc1d4af046b4d782740c89a880443e55,2025-01-17T06:15:15.663000 CVE-2024-13334,0,0,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655747,2025-01-15T04:15:19.720000 -CVE-2024-13335,0,0,883609986959eecbf4b52df3f1201d22b952563f6ac4db46fce38bded4906e66,2025-01-24T11:15:07.973000 +CVE-2024-13335,0,1,20c8c7696547a710a7247fc1375c3fab2f06247460845b286129a3d00d1d053e,2025-02-05T01:37:46.517000 CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000 CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000 CVE-2024-13341,0,0,16acded92547be67b8d1319a2af71c7cc4dd793d079329b45b0485cf9f1e2a5f,2025-02-01T07:15:07.900000 @@ -246280,7 +246280,7 @@ CVE-2024-13348,0,0,e7356b4b7de40bfcab5dcbdec8635d94ba57c9cc43546ece560a6873afe1b CVE-2024-13349,0,0,1a00cf757b3ec26bd50ea0e563207e24798d3893002c58755b8b9af1d412744e,2025-01-31T17:58:59.027000 CVE-2024-1335,0,0,82fb69da532892baa7a81804ae338bd46e69a8bbbad77be8c22b678b91bcc8f9,2024-12-31T16:50:11.167000 CVE-2024-13351,0,0,7985eca9113b0e4ff9b5606ce71f06a97acfce6eac97b8c91847c6875b508284,2025-01-15T10:15:07.993000 -CVE-2024-13354,0,0,8104a8377e052429ffa2c678ce64430177e47e4937649c16c7151cde05098eb9,2025-01-24T11:15:08.887000 +CVE-2024-13354,0,1,70c8df8ffc765e671782c1c5275e6f7668ade0103b0f3f6fd1920147a9a818fb,2025-02-05T01:36:55.960000 CVE-2024-13355,0,0,b14926ff025e929de229a84af4734d711f0473d16ba82bc6498a7b20173af029,2025-01-16T10:15:08.750000 CVE-2024-13356,0,0,f3405be94fa5e0088d8ef4745cf6cc2338fbdcc120e93d37a7b197caba86bf8c,2025-02-04T10:15:07.920000 CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000 @@ -246317,8 +246317,8 @@ CVE-2024-13401,0,0,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509 CVE-2024-13403,0,0,53112ccd99e8ee31939326de2318b841f77ef05c302cd465c214793ac11aacc4,2025-02-04T09:15:09.303000 CVE-2024-13404,0,0,c306a147bdbb783a3f22c9c4f49bd90e70cf49c0fec041c52ab9283c517d7448,2025-01-31T20:18:46.230000 CVE-2024-13406,0,0,3a9e7471bf5857762896fdd475ef755ed514b70430254f571b98831752a93703,2025-01-24T21:20:06.183000 -CVE-2024-13408,0,0,5a61f24d04804b18fc95b4d76e02f04de48f1f1d0fd8c225d8f32c1476fa755b,2025-01-24T11:15:09.043000 -CVE-2024-13409,0,0,ef75f85c40cb8c0d26f22e5e99ad37fd39e21b13fa81537ad4d13708c767c6bc,2025-01-24T11:15:09.213000 +CVE-2024-13408,0,1,e396f32e4dcbb651814f9215fd3a09eb2577d8842a6e7054a1c2694b62332fd0,2025-02-05T01:37:13.827000 +CVE-2024-13409,0,1,16195c232130678b474ab73526a536d491d9fdbf657fb8a2a79faa0112e2d1e0,2025-02-05T01:36:36.047000 CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000 CVE-2024-13415,0,0,078aa9b6eeb5af1c8634c02c595bbb40a0a7ec1b15e21674b1397103dd29c669,2025-01-31T06:15:29.287000 CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000 @@ -246382,7 +246382,7 @@ CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba7 CVE-2024-13530,0,0,a32dca6d75c33e81a9c9eaf2b59e70f20fcbfe169ec3d31442792a7d94733be9,2025-01-31T08:15:07.543000 CVE-2024-13536,0,0,fa522d36319a484a2e2b9f8b9829d55d017393f4354bdc4c1030d71e4db73c91,2025-01-21T05:15:07.490000 CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000 -CVE-2024-13542,0,0,92be261b7b22511b7a14a7364c0a2fabe3ed7cc5767629b3e380a688f4c23391,2025-01-24T11:15:09.377000 +CVE-2024-13542,0,1,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507fbb6,2025-02-05T01:35:33.207000 CVE-2024-13545,0,0,c419b260e5a66c4272590c9c114312d98eb46bbf6a795d5e8b27dcfd0cbd5983,2025-01-24T09:15:22.797000 CVE-2024-13547,0,0,849d60eb07b94b7aa81e2128c4cccb0dc411bc9ac2be92bb4bc290f57219516d,2025-02-01T04:15:30.857000 CVE-2024-13548,0,0,ce678384d6879b1518296d0bd59d7e5e9b3276f2861356166fcc86ea2354903e,2025-02-04T19:27:08.967000 @@ -246395,9 +246395,9 @@ CVE-2024-13561,0,0,719ad5f42c168a91e69745d9f00b297089a3701fa296893125c9677392872 CVE-2024-13562,0,0,b51ff5c1214904c48acd8185520c69905fbad554f23d67d52a0c555fc11349f1,2025-02-04T20:26:53.560000 CVE-2024-13566,0,0,dd455b5c6c79c50cc3a56ce23db0039a6651194309cff2d1529e0608cc927c54,2025-01-31T09:15:06.847000 CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000 -CVE-2024-13572,0,0,9a0b06840f3a79424e6a2863adf0ec6c6f5cf9f46dd5ec042edf40bb0610b8ec,2025-01-24T11:15:09.520000 +CVE-2024-13572,0,1,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000 CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000 -CVE-2024-13583,0,0,aa71d32a09ba879a6f774fda37b6b3f51d13e60a01dbcf4e234a899913383527,2025-01-24T10:15:07.770000 +CVE-2024-13583,0,1,74ad7b83b093ee530d03665dfed8aeb7981ef34d0b7fd0bb7def11fe8ca86354,2025-02-05T01:38:33.527000 CVE-2024-13584,0,0,ee87f1c36c9c93255b87e8f2b16900d4e175847a31f3c291ef2046e604a7f364,2025-01-24T18:20:40.760000 CVE-2024-13586,0,0,031371a39e86dab11794d85bebc5761cfd2812bcdc21ab474a79e1589e56730a,2025-02-04T18:14:20.930000 CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000 @@ -246447,8 +246447,8 @@ CVE-2024-13717,0,0,71a3650f5ab531cb9a1850d83e24949bbb405dc3cae790e8ec5ec60af0ddf CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000 CVE-2024-13720,0,0,b870b55deaed62451c7cb49e48fdc621ee68a35c7c8a7750776cbfa21cdbd2f2,2025-01-30T18:44:43.053000 CVE-2024-13721,0,0,3d01fd2636d19e08bbb60da04d18cfa1babbccecb03f24b5143393a600e41ccf,2025-01-25T06:15:27.860000 -CVE-2024-13722,0,0,984de06d3a9c465e200c05cef6d40bb3f46c015149533726268b5e191bb48830,2025-02-04T22:15:40.113000 -CVE-2024-13723,0,0,220a65234a04b8063a9dc0c78b80767c7281b83b5d90bc3c6853b5c77aa6ff22,2025-02-04T22:15:40.227000 +CVE-2024-13722,0,1,a7a480ea59a28cb898a57ce0712e00dc1b8ef881355807ed8706440a3f5ab3c5,2025-02-05T01:15:08.323000 +CVE-2024-13723,0,1,49a8c971bcd70a22dfe8db41b8c54d4295f983ea1a08ec0646d0192cced65554,2025-02-05T01:15:08.440000 CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000 CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000 CVE-2024-13733,0,0,a9a8d1da3e9ca0d26485df457906e375bbd443f277cddd0693ddf9e0d40b866c,2025-02-04T10:15:08.527000 @@ -254116,7 +254116,7 @@ CVE-2024-29054,0,0,ca067f10dbd952f549de490b8a143c5a74d49758923d6326376ec876a34a7 CVE-2024-29055,0,0,a04fe25ba883ccb44f78366a38aa31576d1a4456a77504bb73087df877c40a47,2024-11-21T09:07:27.810000 CVE-2024-29056,0,0,af2d4852194edc6cf7527ac504763a06fb815f736d4d1949ca388fe427539418,2024-11-21T09:07:27.943000 CVE-2024-29057,0,0,3deaebdc7af567eb027e3b4630e3d0b2f66daac347366af604fd2bccf7d6f841,2024-11-21T09:07:28.087000 -CVE-2024-29059,0,0,044a6984feb8642a951af040c98024cedfb7a63fd2dcd127eff738d3575cbc8b,2025-01-08T18:33:02.303000 +CVE-2024-29059,0,1,cb45373de82efd1b114a127f282f5fbad3837065f2fdac0d80a10c43fbeec6d2,2025-02-05T02:00:01.767000 CVE-2024-2906,0,0,e78fa1cdb9d009f1e1f59fe20ffafc00d26c9427eeacf6bf57bd9ccb61ba19e2,2024-11-21T09:10:48.327000 CVE-2024-29060,0,0,2d9ad229edcbd026ed72ca28f505019f3a24ccfb94a95ee3aaf358451d2c435c,2024-11-21T09:07:28.380000 CVE-2024-29061,0,0,7c8701c84f59f89a131d2c90ff8025ec8c1c9a0e30cbf5684bfc2e3a344ea597,2024-11-21T09:07:28.530000 @@ -266311,7 +266311,7 @@ CVE-2024-45191,0,0,85750924302de32758668d824c400f03ec874589b01e5f9cc93263d9b344c CVE-2024-45192,0,0,43a7c431a16c707384aad36a7c459b5416237a7f09d05eece76501eccaa0c165,2024-09-10T19:35:09.943000 CVE-2024-45193,0,0,97e23cf5bb2e50a369e95a1523b175851171783613d8e26e1d3a20ce3e5a05bc,2024-09-10T19:35:10.143000 CVE-2024-45194,0,0,39e2c5f5618c81787bf696cee2375dcc2cb2276d4de328350b388d7b61cd41b4,2024-11-21T18:15:07.483000 -CVE-2024-45195,0,0,2b90b3e4454ab1c867846fcba998fb7c1f6d9604201ed0a09c53de22f7de3d81,2024-11-21T09:37:28.073000 +CVE-2024-45195,0,1,342f0a98e5a9e3f3efadce0277aa1afa0c0fcf49ef1de377ceb006160be59a37,2025-02-05T02:00:01.767000 CVE-2024-4520,0,0,ee81a89389de5b30bb2a69c5a856e44bc0ce84cd6ef34fd29b4c99337e9f4fec,2024-11-21T09:43:01.267000 CVE-2024-45200,0,0,816959e7602786604e30587a4aecd68df769826aff5588f51b07d55181578adc,2024-09-30T18:35:06.983000 CVE-2024-45201,0,0,1008d923104020063a79ec3ff9863805234d3d78944913eab118b0fc97b0b3b3,2024-11-25T19:15:10.473000 @@ -268528,7 +268528,7 @@ CVE-2024-4844,0,0,e58a1488c0c0593272657966464e317ce8795e1fe0f905dd08d4a2064b2cc0 CVE-2024-48440,0,0,b12e8f498b4696e14421c46fd8136a99002c348d0bb6cd00947a8f2b0d282013,2024-10-25T20:35:11.890000 CVE-2024-48441,0,0,e18fc6f4de2b212db2b7205e1d5eeff25b33b83c871c639edef8600af54d0283,2024-10-25T20:35:12.680000 CVE-2024-48442,0,0,2d256703959d5674c7059d0fc373d70703c32fa535ede7e1382722511cb6ae8e,2024-10-25T20:35:13.447000 -CVE-2024-48445,1,1,754c26197b39498b1ca324dcef9ff45a474b08fe8dac482dc0c5895595eb7b88,2025-02-04T23:15:08.850000 +CVE-2024-48445,0,0,754c26197b39498b1ca324dcef9ff45a474b08fe8dac482dc0c5895595eb7b88,2025-02-04T23:15:08.850000 CVE-2024-48448,0,0,a99f12680e27f2aa26c82e15e379e1be001a083141c2de9e36bbeee9d3fd22db,2024-10-29T21:35:22.540000 CVE-2024-4845,0,0,e1e461ef60509dabf0e7e2dde808d36cb958becba4b5c88bdf30fa8f1c23ed01,2024-11-21T09:43:43.393000 CVE-2024-48450,0,0,2ad4bca80a954b5a64850267d64cde36a0cc73a58476afe8de69f997e4304a47,2024-10-29T21:35:23.350000 @@ -272361,11 +272361,11 @@ CVE-2024-53959,0,0,68036dd248b75f87e5f3d9391181f98f189af951a522aae2a41316aec0dfe CVE-2024-5396,0,0,a2e12a462b12b592c06259ea229afce64d9cb2b529021eb0ae1f63c97dd38d23,2024-11-21T09:47:34.430000 CVE-2024-53960,0,0,980ae01bf410da0473069e1a3eb7a3f001cc1d8a12dcc0d46a5730cb7c2b0449,2024-12-13T17:50:01.533000 CVE-2024-53961,0,0,9476593ad781206d835ddd97d7ad8f5f64796abb2b22390811ef79dd9710b498,2024-12-23T21:15:05.820000 -CVE-2024-53962,1,1,5ada91f70fb611dc3ff8e79d9d59abd44c27e78ab4a135c76c4c1eb63f7b93c2,2025-02-05T00:15:27.410000 -CVE-2024-53963,1,1,d8ef373a285e43953bfbdd64a974ce79a1682e32c9055599e87ae94cecb2d899,2025-02-05T00:15:27.580000 -CVE-2024-53964,1,1,39b4daee6f959c4eab6377c16baae80ab0f8d3779b690dc68ea92595f1bfcd58,2025-02-05T00:15:27.723000 -CVE-2024-53965,1,1,7e4ac7b9cb09dcb6ffc3a37e9699d2075413829afbc7b2594d4ec1e111cab34f,2025-02-05T00:15:27.870000 -CVE-2024-53966,1,1,69ac2ee473a569d89ec9f7498ebd6cbc25967ca7c5aa1aa37957115924efcb10,2025-02-05T00:15:28.023000 +CVE-2024-53962,0,0,5ada91f70fb611dc3ff8e79d9d59abd44c27e78ab4a135c76c4c1eb63f7b93c2,2025-02-05T00:15:27.410000 +CVE-2024-53963,0,0,d8ef373a285e43953bfbdd64a974ce79a1682e32c9055599e87ae94cecb2d899,2025-02-05T00:15:27.580000 +CVE-2024-53964,0,0,39b4daee6f959c4eab6377c16baae80ab0f8d3779b690dc68ea92595f1bfcd58,2025-02-05T00:15:27.723000 +CVE-2024-53965,0,0,7e4ac7b9cb09dcb6ffc3a37e9699d2075413829afbc7b2594d4ec1e111cab34f,2025-02-05T00:15:27.870000 +CVE-2024-53966,0,0,69ac2ee473a569d89ec9f7498ebd6cbc25967ca7c5aa1aa37957115924efcb10,2025-02-05T00:15:28.023000 CVE-2024-5397,0,0,1c1b9f46c7fae3545f6c6bff25b88c782d3838975abd0364f3776c48ef8d8b3f,2024-11-21T09:47:34.563000 CVE-2024-53975,0,0,1c6eb06597883327a72f325fc0f751cbd0dc5c99b87a33d8b2ef4784e7416fa6,2024-11-27T15:15:26.923000 CVE-2024-53976,0,0,e0e34654e2920917adcad83ccc486a90e5a6d39da581d67f84c5bbc103fd6b7b,2024-11-26T16:15:21.430000 @@ -278169,7 +278169,7 @@ CVE-2025-0409,0,0,9622ef176974a666883ccef87aa9961f8329f556e68cbb6ca3f25010c47796 CVE-2025-0410,0,0,77fcc9d20cbc72a10bd98fd8a0d76eb1f68bad51f3fb695c8bb4e738dc713659,2025-01-13T18:15:21.730000 CVE-2025-0411,0,0,50368b34154b513a9bcb2ab4aae83a9d7a98678098c0e282e61908345b547a92,2025-01-29T21:15:20.860000 CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000 -CVE-2025-0413,1,1,38efd3e293bb98a44c17e06abb1696e33085bfc382a611893a29f93413278776,2025-02-05T00:15:28.173000 +CVE-2025-0413,0,0,38efd3e293bb98a44c17e06abb1696e33085bfc382a611893a29f93413278776,2025-02-05T00:15:28.173000 CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000 CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000 CVE-2025-0430,0,0,a8200addb62401843f5be6a163be32dcec6bbc5c81068c809f1c7b05c4147e88,2025-01-17T18:15:30.920000 @@ -279287,9 +279287,9 @@ CVE-2025-23082,0,0,04a4f0f7ff5458b7d3b3235d7001e50f9111979d3e99a4d703024d8cba8b9 CVE-2025-23083,0,0,8381bb96d9de4f3a833b9505098a4089bf36e1c1fc3d25063d3a10cff18f7c26,2025-01-22T02:15:33.930000 CVE-2025-23084,0,0,66590369971d77e93d3e89e756431c61a64701ffca1861b58e6771ed8d358e6e,2025-01-28T16:15:40.827000 CVE-2025-23086,0,0,8c64985aeb33aba8982533ad038d52f283116181730bf252db15e74dc52799fa,2025-01-21T15:15:14.833000 -CVE-2025-23087,0,0,ff3ef66bbdfadd92f4bceb83f017cee238f01afd217540d38de3c3bc4241e457,2025-01-23T22:15:16.260000 -CVE-2025-23088,0,0,351c4fc9ce77a4e8c7f582485a4c81d867817a4e67e2a7d92df2d5afd4de1eba,2025-01-23T22:15:16.370000 -CVE-2025-23089,0,0,53211e365cb35c1ca6468f83d4cfd887f23da2be04794ebbf5b6bdd46246c6fa,2025-01-23T22:15:16.460000 +CVE-2025-23087,0,1,c09e00448cf3f3ebc786843b0cc82ad81bcd87d56a57ec6e0048a7e42908b3f3,2025-02-05T02:15:28.267000 +CVE-2025-23088,0,1,11e8939209f02d223d02a8c736a60c091ca0a72e8830769054cd9ade82334ee6,2025-02-05T02:15:28.413000 +CVE-2025-23089,0,1,e62b1ec51c57d0b0d2343387b9c8a249bdf7ad82d31087c994126a1fe23e1a8f,2025-02-05T02:15:28.517000 CVE-2025-23090,0,0,1fa9642da31f6a1f285e901b43018a8c7dae722f8fb49437e281ea29c270fa57,2025-01-22T02:15:34.443000 CVE-2025-23091,0,0,b0cc14c8e209fbe6063fb24eff4314bed321c702e3c91518f97b3035bbea10ee,2025-02-01T07:15:08.277000 CVE-2025-23108,0,0,0867ae52bf9537919e00df206497183b5abf45a3a43e56579f476cc3d26e8d6c,2025-01-13T18:15:22.680000 @@ -279298,6 +279298,7 @@ CVE-2025-23110,0,0,b9e32d20d7e6cf23b28c590dc2ad7f239b5186f27517cd303db97f7275b07 CVE-2025-23111,0,0,d3dc6414a9d0db9ed3cb07471714e79beac7db7fd4adde1f55f9ce769eca585e,2025-01-10T22:15:27.723000 CVE-2025-23112,0,0,15db9896b5b2ea6c9a640fa45af2c0a8239e079375c847ac6ebc4eb1f4c0822a,2025-01-10T22:15:27.863000 CVE-2025-23113,0,0,1f4b2afdfc961e6cff47003c2a8a61938611b1820102bae5e7ebdff42c0ff218,2025-01-10T23:15:08.810000 +CVE-2025-23114,1,1,84db4de895d9dd2188899e59f93dd681a6b72b6548b6baa41d1b67547aa85c24,2025-02-05T02:15:28.610000 CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000 CVE-2025-23125,0,0,2e6f0fce9ee8e787d649705f4cf1025930f6b72d6ac2efc70c4c1837b8d7d15b,2025-01-11T15:15:09.023000 CVE-2025-23126,0,0,aec9ca15332b86ad22382c8419cfef8190ae4b723f5c3088974b31a1f5dd4089,2025-01-11T15:15:09.100000